Search Results
2. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
3. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
4. Self-Healing Multitier Architectures Using Cascading Rescue Points
5. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization
6. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation
7. A Comprehensive Survey of Voice over IP Security Research
8. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS
9. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
10. Detecting Traffic Snooping in Tor Using Decoys
11. Measuring the Deployment Hiccups of DNSSEC
12. Misuse Detection in Consent-based Networks
13. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
14. Retrofitting Security in COTS Software with Binary Rewriting
15. ROP Payload Detection Using Speculative Code Execution
16. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking
17. The Efficient Dual Receiver Cryptosystem and Its Applications
18. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security
19. The SPARCHS Project: Hardware Support for Software Security
20. Towards a Forensic Analysis for Multimedia Communication Services
21. A Look at VoIP Vulnerabilities
22. A Market-based Bandwidth Charging Framework
23. An Adversarial Evaluation of Network Signaling and Control Mechanisms
24. An Analysis of Rogue AV Campaigns
25. Automating the Injection of Believable Decoys to Detect Snooping
26. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
27. Crimeware Swindling without Virtual Machines
28. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs
29. Ethics in Security Vulnerability Research
30. Evaluation of a Spyware Detection System Using Thin Client Computing
31. Fast and Practical Instruction-Set Randomization for Commodity Systems
32. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
33. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks
34. On The General Applicability of Instruction-Set Randomization
35. Securing MANET Multicast Using DIPLOMA
36. Shadow Honeypots
37. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
38. Voice-over-IP Security: Research and Practice
39. A2M: Access-Assured Mobile Desktop Computing
40. Adding Trust to P2P Distribution of Paid Content
41. A Network Access Control Mechanism Based on Behavior Profiles
42. Anonymity in Wireless Broadcast Networks
43. ASSURE: Automatic Software Self-healing Using Rescue Points
44. A Survey of Voice Over IP Security Research
45. Baiting Inside Attackers Using Decoy Documents
46. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
47. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
48. Capturing Information Flow with Concatenated Dynamic Taint Analysis
49. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
50. Designing Host and Network Sensors to Mitigate the Insider Threat
- « Previous
- Next »
- 1
- 2
- 3
- 4